Adversary modeling and simulation in cyber warfare

被引:0
|
作者
Hamilton, Samuel N. [1 ]
Hamilton, Wendy L. [1 ]
机构
[1] Distributed Infin Inc, La Mesa, CA 91941 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modeling and simulation provide many excellent benefits in preparation for successful cyber operations. Whether used for creating realistic training environments, testing new cyber warfare techniques, or predicting possible adversary actions, it is critical for such simulations to take into account the possibility of an active cyber adversary, able to adapt its plans to network conditions. Without real-time high fidelity modeling and simulation, training fails to address how to cope with intelligent and adaptive opponents, and operations become trial and error exercises rife with high-risk improvisation in situations where the adversary does not follow a well defined script. Unfortunately, current simulation techniques are insufficient to model adversaries capable of dynamic adjustment to changes in the simulation environment. Either adversary actions are completely pre-scripted, or live red teams are required to be on hand to tailor adversary actions to circumstances. In this paper, we present a technique for avoiding the prohibitive cost associated with requiring live red team participation during each use of a simulation environment while still providing the advantages dynamic adversary modeling provides. Our approach utilizes game theoretic techniques, using a new probability based search technique to curtail the search-space explosion issues that previous attempts in this area have encountered. This technique, entitled Partially-Serialized Probability Cutoff Search, also includes a new approach to modeling time, allowing modeling of anticipatory strategies and time-dependent attack techniques.
引用
收藏
页码:461 / 475
页数:15
相关论文
共 50 条
  • [21] Distributed interactive simulation in the evolution of DoD warfare modeling and simulation
    RAND Corp, Santa Monica, United States
    Proc IEEE, 8 (1138-1155):
  • [22] Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare
    Swallow, Robert Chandler
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2023, 20 (01): : 3 - 37
  • [23] Strategic studies and cyber warfare
    Zilincik, Samuel
    Duyvesteyn, Isabelle
    JOURNAL OF STRATEGIC STUDIES, 2023, 46 (04) : 836 - 857
  • [24] Design of Cyber Warfare Testbed
    Chandra, Yogesh
    Mishra, Pallaw Kumar
    SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 249 - 256
  • [25] On domains: Cyber and the practice of warfare
    McGuffin, Chris
    Mitchell, Paul
    INTERNATIONAL JOURNAL, 2014, 69 (03): : 394 - 412
  • [26] On Cyber Dominance in Modern Warfare
    Chen, Jim
    Dinerman, Alan
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 52 - 57
  • [27] A Review: Outrageous Cyber Warfare
    Sahu, Sachin Kumar
    Anand, Abhishek
    Sharma, Aseem
    Nautiyal, Nidhi
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 70 - 74
  • [28] Encyclopedia of Cyber Warfare.
    Bland, Beth
    LIBRARY JOURNAL, 2017, 142 (17) : 103 - 103
  • [29] Cyber Warfare: A Reference Handbook
    Fulkerson, Diane
    LIBRARY JOURNAL, 2015, 140 (09) : 105 - 105
  • [30] Cyber Warfare: A Multidisciplinary Analysis
    Kalpokiene, Julija
    POLITICAL STUDIES REVIEW, 2016, 14 (03) : 431 - 432